General
-
Target
4ed9306b5dd32049c06821b66b76a6f3.bin
-
Size
19.9MB
-
Sample
241122-blzjzsxlhn
-
MD5
df95e2a07c341cc2fb9643c12010f285
-
SHA1
8af6ea0bb2d9d4fd121be941b2e7e976024f9731
-
SHA256
37457f71c7889c825663bf71002438f9cffb88464c3575fde2dc29bc79a2538b
-
SHA512
c622695de4d71a4bc25ded90cd63d29d83c3c85506282883e41d7fd580685e68c397bd6cefc13e2830c73482ffd5c79dc88bb8d03c80b72f4f02ed81ae641df6
-
SSDEEP
393216:seDOX1bwmFTH1EyHJ07A52oAGlkABJHAeQTPIGawOS8Ii/CC7Vqpeh:s2aHz1VpN4HigT9aX/CC7Vqpeh
Static task
static1
Behavioral task
behavioral1
Sample
cho_mea64.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
cho_mea64.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
cho_mea64.exe
-
Size
20.4MB
-
MD5
044f51347e293ac77de4cd47bdccbacf
-
SHA1
4c67777228575ac317c62855e6d9dd0a6da48c2d
-
SHA256
4ca9da66d04a5f68deb0bab55aca5d64b8d8307c58f2943d6a67a3b584855ee2
-
SHA512
f3976170a7f965f9674712904a0effc8383ea1a7ac5961a746b319d4659f52f82578b5adf4a0ca52f0434a896d310268ac7e40391fb0ea929a2482bb78aa0775
-
SSDEEP
393216:SiX7fx65E78eL1uwtkbZtqtQEt8+OIbyMl1PiT+KiSn7h6LPr8Y:bTxOEJuw+bP5krOIO3aKiSn7aPIY
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-